Skip to main content

Full text of "cryptolog_58-nsa"

See other formats


DQClO : 40?L9671 / / 





THERE'S A NEW WORLD COMING — ARE 

YOU READY? (U) 

LIP (U) 

SYSTEM ACQUISTITION DOCUMENT REVIEW (U) 

ANALYSTS OF NSA, ARISE! (U) I 

COMING HOME (U) I 

CIRC: AN INTELLIGENCE DATA BASE CU! . . 1 ~ 

BETWEEN THE LINES OF YOUR PERFORMANCE 

APPRAISAL fU! . . 1 ~ 

NSA-CROSTIC No. 30 (U) D.H.W. 



NSA/ CSS MILITARY LINGUISTIC PROGRAM 20 





Declassified and Approved f< 


ar Release by NSA or 


10-12-2012 p 


ursuant to E.O. 13526, 


VI DR Case # 5477$ 













DOCID: 4019671 



top MECieiyr 








Published Monthly by PI, Techniques and Standards, 
for the Personnel of Operations 



VOL. VII, No. 1 - 3 



JANUARY — MARCH 1980 



PUBLISHER 



WILLIAM LUTWINIAK 



BOARD OF EDITORS 



Editor-in-Chief David H. Williams (1103s) 




Special Research Vera R. Filby (7119s) 

Traffic Analysis Don Taurone (3573s) 



P.L. 86-36 



For individual subscriptions 
send 

name and organizational designator 
to: CRYPTOLOG, PI 



.. nam- 



- -- , 

-- ; • • -• 




TOP SECRET 






DOCID: 



4019671 



CONFIDENTIAL 



There’s a New World Coming 
- Are You Ready? <w 




P.L. 86-36 



. nalyst response to a changing environ- 
, /[ ment is an area that has piqued my 

interest for a number of years. This 
(u ' interest has become especially pro- 
nounced in the last four or five years, 
largely as the result of the increase in 
the variety and number of automated pro- 
cesses that have become available, my 
involvement in a number of long-term 
research projects, and the prospects of 
newer and more sophisticated machine- 
based analytic techniques. As a conse- 
quence, I have given much thought to the 
effects that this increased automation 
will have on the analyst and to what we, 
as an organization, can do to respond to 
the challenges and opportunities that will 
arise. 

cu) If we are to accurately assess how the 
analyst of the future will react to the in- 
creased automation of the analytic process, 
it is necessary to know the analyst of 
today. This is logical, since the majority 
of tomorrow's analysts are already on board 
and active in the analytic field. It also 
becomes essential to define the functions 
of the analyst since all personnel who carry 
the title "analyst" are not analysts by the 
strictest definition of the word. For con- 
venience and easy reference I have divided 
these "analysts" into three categories which 
I've labeled, for lack of any better terms, 
"loggers," "case analysts" and "research 
analysts." 



Jan - Mar 80 * CRYPTOLOG * Page 1 



EO 1 . 4 . (c) 
P.L. 86-36 



CONFIDENTIAL 



HANDLE VIA COMINT CIIAMMEL3 ONLY 




CONFIDENTIAL 



OO&ID: 4019671 



(u) The changes expected as we become more 
and more automated will alter the methods and 
procedures currently used in the analytic 
areas. This will have a profound effect on 
our operations, but to an even greater extent 
it will modify the lifestyle and environment 
of each of the three types of analysts I've 
defined. Each will be affected in a different 
way depending on the analyst's perception of 
analysis, his personality and his ability 
to adapt. 

tu) Once the machine takes over the simple 
data manipulation and recording functions, 
the "logger" will become, to a great extent, 
obsolete. His routine will be upset and his 
workaday world completely disrupted. He 
will no longer have his logging to fill 
his day. He won't know what to do and he'll 
be completely lost. For those currently hav- 
ing trouble isolating the "loggers" in their 
outfits, they'll then be very easy to spot. 
Just look for those people sitting with a 
blank stare on their faces and for those 
making nervous movements at their desks as 
they anxiously try to find something to do. 
Eventually their names will appear on the list 
of those who are abusing their sick leave. 

The real "logger" will never recover from 
automation. He's lost his place in life. 

His day-to-day world will have been destroyed 
and he simply won't know what to do. For 
many it will be too late to start over. Others 
will lack the initiative, while for still 
others, it's nothing more than a lack of 
talent. The world will have passed them by. 
They, of course, will not be to blame. It'll 
be the machines' fault, or management's fault, 
or maybe just the breaks of the game. 

(u) In reality, the "logger" has always been 
a clerk with a professional job title and a 
professional paycheck. He was created by the 
system, and, with the advent of new automated 
techniques, will be destroyed by the system. 
Some will be salvaged. Some "loggers" will 
regroup, retrain and regain a place, perhaps 
at the "case analyst" level. Those that can't 
make the transition will have to be purged 
since the cost of automated systems will call 
for a decrease in personnel expenditures. 



(in The "case analyst" will survive and 
thrive in the new automation. He really 
never did care for the logging and data 
maintenance functions associated with his 
job; therefore, he'll adjust. He'll re- 
order his priorities and use the additional 
time now available for the development and 
analysis that he never could quite get 
around to under the old semi-automated method 
of operation. His productivity will increase 
and mor e technical data on his targets will 
result. T 

| The ultimate gain will 

be the production of more intelligence in- 
formation in satisfaction of our requirements. 
The "case analyst" will grow as a professional, 
honing his skills as he practices his trade, 
and in many instances will develop into a 
"research analyst." 

(u) The "research analyst" will see few 
changes in his method of operation as a 
result of this new automation. He'll have 
to deal with new data bases, new retrieval 
programs and new equipment, but his daily 
routine will remain pretty much the same as 
it is now. He will generally review the 
same types and amounts of material and work 
on the same types of projects. He should 
see some improvements in accuracy and com- 
pleteness as a result of the elimination of 
the "logger" and the automation and resultant 
upgrade of the data bases. He will be able 
to spend less time on the verification and data 
gathering phases of his assigned tasks and 
thereby be able to complete more assignments 
in a shorter time. This will allow a more 
efficient use of the limited number of "case 
analysts" and permit us to achieve maximum 
benefit from their talents. Automation will 
also improve the morale of the "research anal- 
yst" since he will be able to function almost 
entirely in his primary capacity. 

(u) The benefit of this increased automation 
is readily apparent. The talent of our people 
can be used to the fullest, with dull, repeti- 
tive tasks reduced or eliminated. The timeli- 
ness, accuracy and quality of our product will 
increase. Personnel not working at their pre- 
scribed levels can be eliminated, with a result- 
ant savings of money. All of this is, of 
course, predicated on manageable machine sys- 
tems that will function as designed. Since our 
track record for the development of such sys- 
tems is not impressive, let's hope that we have 
learned from experience, and not attempt to reap 
benefits before we have proven follow-on systems. 



Jan - Mar 80 * CRYPTOLOG * Page 2 



CONFIDENTIAL 



HANDLE VIA COMINT CHANNL1L3 ONLY 




DOCID: 4019671 



UNCLASSIFIED 




INTERNATIONAL AFFAIRS INSTITUTE 
3rd ANNUAL ESSAY CONTEST 

Prizes: 1 st Place $ 1 00.00 

2nd Place $ 50.00 
3rd Place $ 25.00 



Winning entries will also be considered for 
presentation in an appropriate Agency 
publication 

Topic: Related to International Affairs 
Enter By: 1 October 1980 

To enter (or for more information) 
Contact Either : 



J B51, Room 3W156 
or 

07, Room 5 A 1 50 8 36 



Winners Announced: October 1980 



Jan - Mar 80 * CRYPTOLOG * Page 3 



UNCLASSIFIED 





DOCID: 4019671 



SECRET 



EO 1.4. (c) 




(U) 



PIE, 



P.L. 86-36 



(U) 3ut why should a linguist have to 
spend time identifying languages at all? 
Why couldn't an automatic, computerized 
method of identifying languages be devel- 
oped? To implement such an automatic sys- 
tem, we would need to construct a data 
base, that is, an information bank where 
all of the information needed to identify 



- a language could be stored. This data base 
could contain models of each langage we 
may need to identify. The models would 
contain all of the information needed to 
identify an unknown text by some compari- 
son technique. Thus any automatic lan- 
* guage identification scheme would have to 
be structured as follows: 

■ language models 

■ comparison method 

<°) For various reasons, it is clear that 
automatic dictionaries are the least effi- 
cient and least reliable method of identify- 
ing languages . 2 Further, linguistic methods 
based upon the morphological or syntactic 
structure of the language require a huge 
amount of effert to construct suitable 
models. The only reasonable approach to 
language modeling which appears easy to 
implement as well as reliable is by statis- 
tical methods. It now becomes a matter of 
deciding which statistic to use, 

< u > We decided to try the simplest approach 
first: which method of modeling, which is 

inexpensive in terms of storage and CPU time, 
will yield acceptable results? Monographic 
modeling is indeed cheap, but not very power- 
ful. The same can be said for standard Agen- 
cy techniques of long standing, such as Delta 
I.C. and logweights (see Chart 1). 

(U) The next possibility for modeling would 
be digraphs. Here is where the solutiog ^as 35.35 
found. A digraphic model of a language's ' 
very easy to construct, requiring a relative 1 ' ^ c ' 
ly small amount of text as input and very 
little storage for the model. A digraphic 
model stores the information in a digraphic \ 
matrix (see Chart 2) in terms of the prob- 
ability of each possi ble digraph occuring \ 

for a given language, f 



2 For details see the PI ft .paper of 25 July 
1979 bj 



P.L. 86-36 



Jan - Mar 80 * CRYPTOLOG * Page 4 



P.L. 86-36 



SECRET 



HANDLE VIA COMINT OIIANNELO ONLY 





DOCID: 4019671 



UNCLASSIFIED 

fc.L. 86-36 




Jan - Mar 80 * CRYPTOLOG * Page 7 



UNCLASSIFIED 




DOCID: 4019671 




Jan - Mar 80 * CRYPTOLOG * Page 8 



P.L. 86-36 






DOCID: 4019671 



UNCLASSIFIED 



WHY ARE ALL THE STREETS IN AMERICA WHICH ARE NAMED AFTER A 
FRENCHMAN IN SUCH TERRIBLE CONDITION, AND WHO WAS THIS FELLOW 
DETOUR, ANYWAY? 



It is generally conceded that book-learning is not the best way 
to learn a foreign language. Instead, most people agree that the best 
way is to actually live in an environment where the language is present 
24 hours a day. When a person sees and hears the words in a foreign 
language around him he soon learns what makes sense and what doesn't. 

How long, for instance, does it take for even the least language- 
oriented person to realize that there isn't any famous person named 
Einbahn, after whom so many streets are named throughout Germany and 
Austria, all of them coincidentally one-way streets? Well, I'll never 
forget the trip that two adults and four children, in one Rambler 
station wagon, took from Oberammergau , Germany, to Lake Garda, Italy. 

The reason why I'll never forget it is not just the horror I felt as 
I was being pushed down the Dolomites (it must have been at 150 miles 
an hour) by good-natured Italian truck drivers trying to meet a schedule. 
No, the reason is that, during calmer, flatter stretches of the trip, 
when I could relax my grip on the wheel and enjoy the scenery, it had 
seemed to me that Italian villages have such pretty names. But can 
they all have the same name! Hadn't we seen that name a few hours back 
when we were crossing that bridge? Then a half-hour ago when we went 
past the quarry? And here's anothev village with the same name — 

Lavori in Corso. Oh, dammit, I told myself, learning Italian quickly, 
it means "Men at Work"! 



Right after World War II, as the Cold War was starting up, the 
United States had to think of ways to get information to "the Russian 
People." The proposed methods included balloons that were supposed to 
blow from west to east but often didn't cooperate. One method that was 
used at an early stage was to set up an official U.S. radio station, 
transmitting in Morse code to all the hams in the Soviet Union. Since 
it was an official U.S. radio station, it had to have a callsign be- 
ginning with a K (if the transmitter is located west of the Mississippi) 
or a W (if located east of the Mississippi) . Since the transmitter was 
located on the East Coast, is was a W. And since callsigns often mean 
something — WGMS, for Washington's Good Music Station— it was decided 
to call this transmitter WRU, for U.S. radio transmitting to RUssia. 

But it didn't take long for Washington to learn that the Russian People 
didn't believe any of the broadcasts. Eventually someone pointed out 
that if you send the callsign in Latin letters, WRU, in Morse code 
(.-- .-. ..-), any Russian ham would convert those dits and dahs to the 
Russian letters BPy, which, unfortunately, represent the Russian word' 
for "I'm lying." Well, back to the balloons... 

Excerpted from "Twelve Language Anecdotes in 
Search of an Author," by Arthur J. Salemme, 
formerly PI, now retired. 



To Subscribe to CRYPTOLOG, 

Or to Change Your Address, Call 
1103s 



Jan - Mar 80 * CRYPTOLOG * Page 9 



UNCLASSIFIED 



SIGNATURE SAO 



DOCID: 4019671 



ron ornom u s e o w iv 



SECURITY CLASSIFICATION 

SYSTEM ACQUISITION DOCUMENT REVIEW 



COVERNAME 



NSA FORM H8274 JUN 79 

SYSTEM ACQUISITION DOCUMENT REVIEW 



PORTIONS TO WHICH THIS CRITIQUE PERTAINS 

(Section) I (Page) I (Paragraph) 



(Line) 



SAO USE ONLY 



CONTROL NO. 



ACTION (If marked, indicate retpontlble 
individual ) 



due date (Action completed) 



resolved (If marked) 



unresolved (If marked, no resolution found 
during review, mayfmay not regutre further 
attention) 




P.L. 86-36 



reviewer indicating agreement to final disposition 



SAO official final disposition ‘ 




FORM H8274JUN 79 



security classification 



Jan - Mar 80 * CRYPTO LOG * Page 10 



t o n OF F I CIAL use 0H1 ¥ 





DOCID: 4019671 



ro w off i c i al use oniv 



p.L. 86-36 



ANALYSTS OF NSA, ARISE! 

YOU HAVE NOTHING TO LOSE BUT YOUR PAPER 

o This entire article is 

LL& TOR OF F ICIAL UOE ONLY 



N SA is in the midst of a revolution. Be- 
fore anyone rushes to call the Federal 
Protective Service, let me quickly add 
that the revolution, here at NSA, is an in- 
formation services revolution. Webster's New 
International Dictionary defines the word re- 
volution as a "total or radical change.” A 
total change is exactly what is happening, in 
a rapidly evolving way, to the methods of 
information storage, retrieval, and dissemi- 
nation now available or being planned at NSA. 
The radical change occurring at this Agency, 
of course, represents only a microcosm of the 
vast and rapid evolution of computers, data 
entry devices, and data storage devices which 
is taking place worldwide. New, swiftly 
growing industries offering information to 
the public, on virtually every subject 
known to man, have appeared in the last 
decade. This information is now instantly 
available by attaching a device about the 
size of a portable typewriter, to your tele- 
phone. 

The New Information Entrepreneurs. T12,: 
Information Services, now subscribes to the 
data bases of several of these new information 
entrepreneurs, including Lockheed's DIALOG, 
Bibliographic Retrieval Service's BRS/SDI 
Service, and the New York Times ' DATABANK. 
Hundreds of hours of manual research time is 
now condensed to seconds and minutes when 
searching the vast data storage banks avail- 
able via a telephone line to computers located 
in such places as Palo Alto, California and 
Scotia, New York. NSA information science 
analysts will query these data banks to aid 
in your work-related research on such diverse 
topics as chemistry, psychology, economics, 
education, physics, engineering, social sci- 
ences, medicine, drugs, industry and hundreds 
of other subjects. NSA is now considering the 
addition of LEXIS and NEXIS services offered 
by fyeade Data Central. LEXIS is a legal 
citation service covering federal and state 
law. NEXIS is an extremely powerful research 
tool which provides a full text search capa- 
bility of news sources such as the wire ser- 
vices, news magazines, newspapers and journals 
for a three year period. The addition of NEXIS 
to T12's inventory of commercial data bases 
would potentially eliminate a great amount of 
open source processing now being done. 



Government-Sponsored Data Bases. T12 
has direct access to a number of gov- 
ernment-sponsored data bases which offer 
information of great value to NSA analysts. 
These include the files of the Defense 
Technical Information Center (DTIC), which 
provides access to technical reports on re- 
search and development projects of the De- 
fense Department. These reports are avail- 
able in special categories, on microfiche, 
in the NSA Library. Other DTIC data bases 
| offer descriptive summaries of DoD R § D 
! activities. COINS (Community On-line Intel- 
ligence System) offers valuable community- 
wide intelligence information to NSA custom- 
ers with a need-to-know. 

NSA's In-House Developments. USA's mis- 
sion must, however, be also served by infor- 
mation data banks developed and operated in- 
house. The useful and valuable classified 
information available through the SOLIS system 
is, of course, accessible by T12*s information 
science analysts in researching your classi- 
: fied queries. In the last few years, T12 has 
developed and maintained a large number of 
its own specialized information data bases 
using the M204 language and the IBM 370/168 
computer for storage and retrieval. These 
machine systems have greatly reduced the 
r enormous collections of file cabinets so 
familiar to visitors to the old CREF. New 
systems, now underway and being planned, will 
soon guarantee that the last manual file cabi- 
net, like the pterodactyl, will fade into ex- 
tinction. 



T12 is now hoping to solve one of the great- 
est barriers to the rapid conversion of the 
written word to digital form by using the 
Kurzweil data entry machine. This device, 
designed to "read" ordinary print and convert 
it to computer -compatible digits, was devel- 
oped by the same company which originated 
the Kurzweil reading machine for the blind, 
now available for use in the NSA Library. The 
successful employment of this device, or one 
like it will do away with the slow "poking- in” 
of data by a human, so essential to the com- 
puter storage and retrieval of information. 



Through 

mation retrieval 



1 



T12* s in-house infor- P • L 



system, analysts will be able 
to index the hundreds of thousands of reports 



Jan - Mar 80 * CRYPTOLOG * Page 11 



FO B BfMCML USE 0N1 V 





DOCID: 4019671 



TOP 3ECRET UMBRA 



which contain information needed by Agency 
analysts in their daily work. Storage of 
full texts using new ultra-high reduction 
techniques on microfiche is being studied 
under Pro j ect I I 



What This Revolution Will Accomplish, 
What does all this mean to the Agency analyst 
working against a deadline and seeking infor- 
mation vital to the completion of a report? 

It means that time- sensitive information will 



Manipulation of Electrically Received 
Information. Other systems, designed to 
handle information received electrically, are 
also under developemnt using hardware and 



already in use in another Agency 

the name given to this pro- 



software 
system 

ject no \l AwAitih^ software modification, will 
store large quantities of classified infor- 
mation presently received here via teletype 
and will enable the researcher to perform 
full-time searches by words, subjects, series 
numbers and other approaches. Thousands of 
documents now being processed manually for 
hard copy files, a process which is both 
labor intensive and time consuming, will be- 
come immediately available to researchers 
throughout the Agency using easy-fo-leam 
search strategies. Automatic distribution 
of these documents, in hard copy, is already 
taking place under P roject s 



tor hard copy. 



will eliminate 



r 1 

.minate th 



and 

e need 



be available when it still has meaning and 
importance. It means that , in many cases, 
information will be available to the anal- 
yst, 24 hours a day, by querying T12 *s data 
bases directly, if required. It means get- 
ting an answer to your question in seconds 
or minutes instead of hours or days. 

The American Revolution freed us, as a 
nation, from foreign domination; the infor- 
mation services revolution will free, us, at 
last, from the overwhelming flood of paper 
that has dominated us for so long, stealing 
our time and efficiency. It may also, in- 
cidentally help save our forests for other 
uses. 

The next time you call for information 
services from T12, don’t be surprised when 
your question gets researched and answered 
with revolutionary zeal! 



* * * * 



’ P . L . 86-36 



WINS SYDNEY JAFFE AWARD (U) 



fTSCl At the 198 0 Crypto - Linguist i c Association Annual Banquet 
| of the Language Department of the National 
Cryptologic School was presented the Sydney Jaffe Award, the highest 
recognition a member of the Agency can achieve in the language field. 
His significant accomplishments as an Arabic linguist span an 
Agency career of some 24 years. T 



■fC) In 1 977 . 1 1 performed pioneer work in developing 

National Cryptologic School courses in the Syrian, Iraqi, Libyan and 
Egyptian dialects of Arabic. Unique among these is the Libyan 
course, the only such course available to the intelligence community. 
For this seminal work in course development, he received the Agency ’ s 
Meritorious Civilian Service Award. 

fUl If there has ever been at NSA a linguistic factotum, it is 

| | He yields to no one as a model of the traditions 

and ideals set by Dr. Sydney Jaffe. 




P.L. 86-36 



EO 1 . 4 . (c) 
P.L. 36-36 



86-36 



Jan - Mar 80 * CRYPTOLOG * Page 12 

TOP SECRET UMBRA 






DOCID: 4019671 



UNCLASSIFIED 





G 





p. 



L. 



86 



This article was originally published in the 
WIN [Women in NSA] Newsletter for May 1980. 
Since the problem it addresses is certainly 
not limited to Agency women, but rather 
applies to all employees returning from 
tours of duty elsewhere, it is reprinted 
here so that it may reach a wider reader- 
ship. dhw. 



L ast year, I was fortunate to have been selected 
for an external training program. I was thrilled, 
not only because of the opportunity It provided for me 
to learn more about the Inner workings of the entire 
Department of Defense, but because 1 felt also that I 
would then be assimilated back Into the Agency In a 
more responsible position. After all , If the Agency 
thought enough of me to have selected me for this 
"plum," then would they not want me to use ny know- 
ledge, later, to the best advantage?— or so I thought. 

Judging from my past job experience In several 
areas of the Agency, In addition to my recent schooling, 
I felt I was ready to assume a position of greater re- 
sponsibility upon my return; however, I was stymied In 
ny attempts to find such a position. My two-month at- 
tempt to find a job before 1 returned to the Washing- 
ton ^rea was greeted with such responses as: "We've 

just changed the PNM's, and your name will no longer 
be circulated to key components" (as I had been led 
to expect prior to my departure); and "We've Just 
changed the PW's and you must return to your original 
key component, since they sponsored you" (that's been 
changed again, 1 understand). (The difficulty was 
compounded by my trying to do business via a long- 
distance cornnerclal phone.) Rather than being given 
a choice of assignments, I was told that I would take 
a job In a certain organization* and I drove back to 
the Washington area specifically to Interview for this 
Job. After the interview, I decided, for several rea- 
sons, that this wes not the job for me; however, 1 was 
"on the books" as returning to that job, and that was 
that, as far as the Agency was concerned. When I re- 
turned to the Agency, I personally scouted around and 
arranged some Job Interviews, but I felt that I didn't 
have the time to pursue potential opportunities be- 
cause I was under pressure to be assigned SOMEWHERE. 

I finally returned, In a similar capacity, to the group 
from which I had left. The other three Agency employees 
who were In school with me also returned to the same or 
similar jobs. A sad commentary, I feel. 

1 am grateful for the opportunity the Agency pro- 
vided for me to broaden my knowledge. However, I do 
have a few suggestions for both the Agency and for those 
employees contemplating applying for external training. 
First of all, I know the Agency's reasslmllatlon program 
has historically had its problems, and I am confident 



that the current administration is doing everything It 
can to help remedy the situation. 1 can't speak about 
overseas returnees, but It seems to me that those re- 
turning from specialized external training, such as the 
joint and senior service colleges that provide their 
sutdents with a broad background In military affairs, 
could be used by the Agency In a variety of areas. I 
know that there Is one slot, a one-year tour as execu- 
tive assistant to the Deputy Director— that goes to a 
returnee from the National War College— but other areas 
of the Agertcy &Wld ilso use the special kind of ex- 
pertise gleaned from this training. A one-year tour 
in any one of these ereas would benefit both the Agency 
and the employee. In lieu of that, the employee should 
not be "locked into" a job upon his or her return. A 
number of Interviews (perhaps three) should be arranged 
for the employee. There's no substitute for personal 
contact to aid one in deciding if one could effectively 
work with an Individual or In a particular area (one 
can't make this decision via long distance), and a 
specified period of time (a week or ten days) should be 
allotted the employee to make up his or her mind. 

Falling this, what can YOU do to assure yourself 
a good Job upon your return? (This advice holds true 
also for those who may be contemplating a change of 
jobs.) First, make certain your Personnel Summary Is 
up to date, and don't be shy, even before you go on 
TDY, about giving It to those who may be In a postil on 
to place you. Secondly, decide which areas REALLY In- 
terest you; find out what you can about these areas, who 
the managers are, and get appointments with them. Host 
managers are willing to talk to potential employees. 
Thirdly, don't discount the theory of "networking"— 

It can work for you. A few of the job Interviews I 
lined up were as a result of "contacts" I had made 
while working on a group-level staff. A few managers 
even remembered me from my stint as a Director's 
briefer (and that was In 1973!). In addition, senior 
WIN members were very generous In giving me advice and 
support. 

In short, the opportunities are there; YOU CAN MAKE 
IT HAPPEN! . 

Now, nine months after my return, I have secured 
a very good, career-enhancing position. It’s nice to 
have the better job now, but It would have been even 
nicer to have obtained It upon my return. 



Jan - Mar 80 * CRYPTOLOG * Page 13 



UNCLASSIFIED 




DOCID: 4019671 



CONFIDENTIAL 




AN INTELLIGENCE 
DATA BASEou 



P.L. 86-36 





IRC, which stands for Central Infor- 
mation Reference and Control, is a 
system of scientific and Technical 
(S § T) intelligence support which is oper- 
ated under the auspices of the Defense In- 
telligence Agency (DIA) by the Foreign Tech- 
nology Division (FTD) of the Air Force Sys- 
tems Command (AFSC). The primary purpose of 
CIRC is to support the intelligence infor- 
mation needs of the five DoD S S T intelli- 
gence productions agencies: the Naval Intel- 

ligence Support Center, the Army's Foreign 
Science and TEchnology Center (FSTC) , Medical 
Intelligence Information Agency (MIIA) and 
Missile Intelligence Agency (MIA), and FTD. 
Access to the CIRC data base is available to 
other organizations, and NSA does have a CIRC 
terminal. 

CIRC means on-line access to almost 1.5 
million documents, and another 3.6 million 
are available through batch searching. These 
5 million records are available to NSA for 
retrospective research through the remote 
terminal, which is located in T1232 (Soviet 
Data Support Workcenter) , Room 3W032, x5989s. 
For on-line searching the terminal converses 
directly with the computer located at FTD, 
at Wright-Patterson AFB, Dayton, Ohio, and 
retrieves document references and abstracts 
in response to search queries. CIRC pro- 
vides document retrieval in a bibliographic 
sense, giving citations to documents re- 
lating to a given subject or author, rather 
than selected and sorted data ready for in- 
sertion into documents which the requester 
may be preparing. The intent is to furnish 
source material to be studied by the re- 
quester, who then has to decide the suit- 
ability and validity of the information. 

The user does not receive the document it- 
self from the computer; instead, represent- 
ations of the reference are retrieved, giving 



such. things as title, date .of report, report 
number or source, text extract, and ending 
with a list of specific surnames, facility 
names, and nomenclature designators occur- 
ring in the document. Should the requester 
need the entire document, T1232 can usually 
obtain it. 

^ A major difference which tends to sep- 
arate CIRC from many other data bases is 
that CIRC does not use a controlled diction- 
ary of terms or keywords. Virtually all the 
words in the extracts entered into the CIRC 
system are usable in searching, with the 
exception of some common words such as "both," 
"who" or latter," which contribute little to 
retrieval. Because of the free text type of 
search, use of broad terms will certainly 
lead to a high chance of irrelevant retrievals 
while obtaining all the essential coverage. 
Therefore, the requester should be prepared 
to screen a great deal of information to avoid 
missing anything that seems pertinent. The 
other extreme — very narrow terms — will usu- 
ally render an output of mostly relevant doc- 
uments but eliminating some valid ones in 
which the searched items are expressed differ- 
ently in the referenced document from the 
search terms used — for example, searching 
for the SA-7 missile, but not for its nick- 
name GRAIL, or looking for the nickname 
FISHBED, but not for MIG-21. If SA-7 or 
FISHBED were not in the reference, but GRAIL 
or MIG-21 were, the reference would not be 
retrieved. The indexer can only use terms 
that are precisely in the reference and is 
not to assume a relationship unless it is 
spelled out. Thus, there are problems in 
using narrow or specific terms without using 
synonyms or related terms to achieve full 
subject coverage. 

DATA BASE CONTENT. Documents entering the 
CIRC data base contain information about jbr- 




Jan - Mar 80 * CRYPTOLOG * Page 14 



eO NFIDENTIAL 





DOCID: 



4019671 



CONFIDENTIAL 



eign science and technology as it relates 
to U.S. Array, Navy and Air Force interests. 
All scientific disciplines, engineering spec- 
ialties and technologies are represented as 
available. Worldwide coverage is maintained 
with emphasis on Communist countries. U.S. 
information is not included except when it is 
incidental to foreign data. 

00 Domestic and foreign open source pub- 
lications are included in CIRC as well as 
classified messages, Intelligence Information 
Reports and other material of all classifi- 
cation levels up to TOP SECRET CODEWORD and 
TK. Army, Navy and Air Force finished tech- 
nical intelligence publications containing 
analyzed information are entered into CIRC, 
as well as reports of some non-DoD agencies. 
The DoD S § T agencies also participate in 
obtaining information from other sources 
(such as NSA and CIA which do not submit 
reports directly to CIRC) for inclusion in 
the CIRC data base. 

""W— About 83 percent of CIRC’s on-line data 
bases and 93 percent of the total CIRC data 
bases — on-line and batch — comes from foreign 
literature, 4.7 million out of a total of 
5 million references. In 1979 over 1350 sub- 
scriptions to worldwide publications were 
scanned for content selection for CIRC. This 
provides a great number of open source un- 
classified references to a broad spectrum 
of subjects, nomenclatures, facilities, and 
authors or personalities, which are available 
for search, again, worldwide in coverage, but 
with emphasis on Communist countries. The 
other 7 percent of CIRC, nearly 300,000 docu- 
ment records, includes finished intelligence 
reports. IIR's. sensor reports, and other 



(u) Many of the open source references are 
not available for computer retrieval else- 
where, so this part of CIRC is largely unique. 
While the retrieved abstract is in English, 
most often the open source referemce will 
be in the original language. The reference 
in CIRC refers the requester to the original 
periodical, journal, newspaper or monograph 
for the complete article. 

OFF-LINE PRINT ORDERS. Because the on-line 
terminal printer is slow, bibliographies are 
usually ordered from FTD for off-line print- 
ing and mailing to T1232 for forwarding to the 
requester. There is only one NSA on-line 
terminal; when it is receiving output from 
the computer, no searches can be initiated. 
Bibliographies classified up to SECRET take 
seven to ten calendar days from order to 



receipt in T1232. TSC/TK orders take two to 
three weeks, since they roust be sent by 
courier, and there is only one courier flight 
per week from Wright-Patterson AFB to the 
Washington area. (If an order misses a 
flight, it must wait an entire week until 
the next one.) Thus, any request resulting 
in a number of retrieve references must allow 
ample time for the delievery of the data. 

FTD is hopeful that high speed printers will 
someday be installed at the principal CIRC 
user sites (including NSA) , which will result 
in much faster delivery, usually by the next 
working day, and will free the remote on-line 
terminal for queries. Instead of printing 
and shipping by mail or courier, FTD will 
use the high speed printers for transmission 
of the bibliographies to the system-associated 
workcenter. No firm date for this enhancement 
is available, but FTD is hoping it will take 
place during late FY1980 or early FY1981. 

Where possible, T1232 will attempt more ex- 
peditious responses for high priority requests 
as appropriate. p, L 

PROFILES. One additional CIRC feature— the E0 
profile — is availble to requesters who want 
selected information on a current, recurring 
basis, A CIRC profile is a preselected canned 
query prepared for a requester arid stored 
on-line at FTD. When the CIRC data base is 
periodically updated, prior to their being put 
, on-line, the newly added documents are auto- 
matically compared with the profiles, and 
those documents which match the profile search 
statements are printed and sent on to the re- 
quester. A profile is a good way to maintain 
current awareness on a particular topic as 
material is added to CIRC. Queries may con- 
sist of terms, nomenclatures, personalities, 
facilities or organizations, countries, source 
(such as a specific publication), or classi- 
fication of the references. Queries may be 
as narrow or as broad as the requester de- 
sires. Profiles may be of any classification. 



. 8 6-f36 
1.4. (c) 



USING CIRC. CIRC usage at NSA has been in- 
creasing substantially over the last several 
years to the point where NSA is among the 
top five users of the data base. This is 
despite the fact that the availability of 
the data base within the Agency has not been 
widely publicized, because, in part, of 
computer downtime problems, which have led to 
feelings of uncertainty about response times. 

Use of CIRC can be cumbersome bacause the 
data base is so large it is broken into two 
segments: the afternoon, or classified, ses- 

sion where a full abstract of the reference 
is available for all classified references 
(TSC/TK material is available during this 
session only) , and the morning, or unclassi- 
fied session where a full abstract is avail- 
able on-line only for unclassified references. 



Jan - Mar 80 * CRYPT0L0G * Page 15 



CONFIDENTIAL 





DOCID: 4019671 



UNCLASSIFIED 



If a CONFIDENTIAL or SECRET reference is re- 
trieved on-line is the morning session, only 
the microfiche number is given. This pro- 
cedure is followed because not all terminals 
for the unclassified session are in secure 
locations, because a number of users have 
dial-up terminals which use unsecure tele- 
phone lines. Off-line bibliographies do 
print the complete abastracts of classified 
morning references. 

The morning unclassified session is so 
large that FTD's IBM 360/65 cannot contain 
all of the references, so it has been broken 
into three segments: 

■ CIRC, which consists of the CONFI- 

DENTIAL and SECRET material, as 
well as the last two years of un- 
classified input. This is avail- 
able on-line every morning except 
Wednesday. 

■ CIIO, which contains unclassified 

material entered into the system 
within the past two to five years. 
This is available on Wednesday 
mornings. 

■ ARCH, consisting of: 'the archival data 

base of unclassified references which 
were input over five years previously. 
This material is available only for 
batch searches. 

Thus a requester wanting complete coverage 
from all of CIRC might receive four separate 



LIP (Continued from page 8) 



outputs, all containing different references, 
from CIRC, CIIO, ARCH, and from SISA, the 
TSC/TK data base. Of course, searches can 
be limited by classification or by date span. 
The requester can limit his retrievals by 
indicating specific desires when making his 
request. 

(u) The primary costs to NSA for the use of 
CIRC are the expenses of the 24-hour dedi- 
cated circuit to FTD, paper for the printer, 
the cost of the Teletype Model -40 Keyboard 
Display Printer, and the salary of the one 
analyst who spends most of her time doing 
CIRC-related activities. There is no charge 
for search time, printing or mailing, ot 
for CIRC microfiche. 

(0) All in all, CIRC is an excellent data 
retrieval system, which is to a considerable 
extent unduplicated by any other system. 



* * * * * * * * 



Analysts who have not been aware of 
the existence of CIRC, and who might 
have questions concerning the system, 
or who might wish further information 
on how CIRC retrievals of profiles 
could help them, should call the NSA 
CIRC remote terminal location, T1232, 
on 5989s, or drop in at Room 3W032, 
where T1232 personnel will attempt 
to answer their questions. 



00 An interactive computer program has been 
developed on the LODESTAR system for use by 
the analyst/linguist. The program uses the 
technique discussed above, and has complete 
instructions for its use contained in the 
program itself. The program can usually 
identify the correct language in under three 
seconds of CPU time. For further deails, 
contact one of the authors. 

Editor's note: Since the writing of this 

article, the data base has been expanded by 
the inclusion of the major languages of Europe. 

cu) The authors feel that this "distancing" 
tecnnique described here probably has other 
applications in addition to language identi- 
fication. Readers who wish to discuss such 
applications are requested to call either Dr. 



SOLUTION TO NSA-CROSTIC No. 29 

"[A Propos ed Cure for the] Tim e-in-Grade 
Syndrome," I [CRYPTOLOG, 

November 197/ . 

"In general, promotion decisions [must] 
ultimately determine [just] who will make 
the key decisions within [an] organization. 
...The initiative for promotion must belong 
to the managers and it is their responsi- 
bility to see that worthy personnel are 
promoted. It [must] be the employees' re- 
sponsibility to qualify for promotion." 




P.L. 



86-36 



Jan - Mar 80 * CRYPTOLOG * Page 16 



UNCLASSIFIED